Chaotic coyote optimization algorithm for image encryption and steganography

被引:0
|
作者
Huawei Tong
Tianyou Li
Youyun Xu
Xinzhong Su
Guopeng Qiao
机构
[1] Nanjing University of Posts and Telecommunications,College of Telecommunications and Information Engineering
[2] National Engineering Research Center of Communications & Networking,undefined
来源
关键词
Metaheuristic; Encryption; Steganography; Image processing; Information security;
D O I
暂无
中图分类号
学科分类号
摘要
It is significant to ensure the communication networks and information security, and balancing simplicity and complexity is still a real issue that is the key to improve the effectiveness of a scheme in many applications scenarios.Current researches focusing on the security of digital images and putting barriers to protect sensitive data still have room for improvement. Herein,the aim of this paper is twofold. Firstly, we propose a color image encryption method by utilizing Chaotic Coyote Optimization Algorithm to solve the key selection problem for minimizing the correlation between adjacent pixels of the cipher image, where three color channels are processed to enhance its security against various attacks. Secondly, we design a color image Steganography scheme that has ability to defend common types of the image attacks. In the design stage of embedding, the Chaotic Coyote Optimization Algorithm and a special designed strategy are implemented together to handle the problem of location selection to lower the distortion in all components of the embedded image. According to the simulation results, the proposed image encryption method is efficient and robust considering the performance indexes: correlation coefficient, information entropy, number of pixels change rate, unified average changing intensity, and histogram. Meanwhile, the image Steganography approach also provides satisfying effect compared with other methods in the literature, based on indicators of peak signal-to-noise ratio and structural similarity.
引用
收藏
页码:20861 / 20887
页数:26
相关论文
共 50 条
  • [41] Chaotic System Image Encryption Algorithm Base RSA
    Zhao, Fuzhe
    Guo, Junnan
    Xu, Han
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL II, CENET 2023, 2024, 1126 : 81 - 91
  • [42] New chaotic image encryption algorithm based on rossler
    Liu, Shihui
    Qiu, Runhe
    INFORMATION TECHNOLOGY, 2015, : 263 - 268
  • [43] An improved image encryption algorithm based on chaotic maps
    Xu Shu-Jiang
    Wang Ji-Zhi
    Yang Su-Xiang
    CHINESE PHYSICS B, 2008, 17 (11) : 4027 - 4032
  • [44] An improved image encryption algorithm based on chaotic maps
    Fu, Chong
    Zhang, Zhen-chuan
    Cao, Ying-yu
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 189 - +
  • [45] An improved image encryption algorithm based on chaotic maps
    徐淑奖
    王继志
    杨素香
    Chinese Physics B, 2008, 17 (11) : 4027 - 4032
  • [46] A novel image encryption algorithm based on chaotic billiards
    Charif, Khalid
    Guennoun, Zine El Abidine
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01): : 129 - 154
  • [47] Image encryption algorithm using chaotic Chebyshev generator
    Huang, Xiaoling
    NONLINEAR DYNAMICS, 2012, 67 (04) : 2411 - 2417
  • [48] A Designed Image Encryption Algorithm Based on Chaotic Systems
    Huang, Xiaoliang
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2012, 9 (12) : 2130 - 2135
  • [49] Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
    Alvarez, G.
    Li, Shujun
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) : 3743 - 3749
  • [50] An image encryption algorithm using the combination of chaotic maps
    Arab, Alireza A.
    Rostami, Mohammad Javad B.
    Ghavami, Behnam
    OPTIK, 2022, 261